diff --git a/_layouts/about.html b/_layouts/about.html index 930f531..6ecfbb3 100644 --- a/_layouts/about.html +++ b/_layouts/about.html @@ -9,6 +9,15 @@ {%- include header.html -%}
+
+

About Distrust

+

Distrust was founded in order to improve the security, privacy and freedom of individuals and organizations and promote principles of Open Source software worldwide. We specialize in helping organizations reduce risk through a holistic first principles approach rather than simply checking boxes according to often outdated "best practices". +

+

Close collaboration with our clients allows us to attain a deep understanding of technology stacks which we use to help teams refine threat models and ensure that the mitigating controls being used establish a reasonable level of security accordingly. We do this by offering variety of services which are tailored to fit the client needs, ranging across penetration tests, secure code review, threat modelling, system architecture design, supply chain security, infrastructure hardening, and more. One of our specialties is designing secure systems for management of cryptographic material, especially in the context of blockchains. +

+

Our clients are varied, many of them from high risk areas such as financial institutions, blockchain companies managing large quantities of cryptocurrency and electrical grid operators to name a few. We proudly continue to support such organizations, and use the knowledge we have attained to aid all our clients in achieving a better security posture.

+
+

Approach

Like most security firms, we often start relationships with full stack audits. We also have enough experience in this industry to admit another firm will find bugs we missed, and vice versa. Our true goal in audits is to understand your threat model and find a path to fundamentally remove entire classes of relevant attack surface.

@@ -17,13 +26,13 @@
  • Can your Google Authenticator codes be phished?
  • Can your SMS 2FA solution be SIM Swapped?
  • Can someone tamper with your Git repos or CI/CD systems?
  • -
  • Would it be profitable for someone to buy a $50,000 0day to compromise employee devices?
  • +
  • Would it be profitable for someone to buy a $50,000 0day to compromise an employee devices?
  • What happens when the FedEx guy leaves a tampered USB C cable on a conference table?
  • Who reviews the code of your third party dependencies?
  • What happens when your IT administrator is compromised? Or a production engineer?
  • Can a change in local political landscape fundamentally halt your business?
  • Can someone buy a server next to yours and steal your secrets via a side channel attack?
  • -
  • How do know the offline laptop with the keys to the kingdom has not been tampered with?
  • +
  • How do you know the offline laptop with the keys to the kingdom has not been tampered with?
  • Do you have a plan for when your production systems are compromised?

  • @@ -42,7 +51,7 @@ @@ -51,7 +60,7 @@

    Transparency